Note: This is an archival copy of Security Sun Alert 242806 as previously published on http://sunsolve.sun.com.
Latest version of this security advisory is available from http://support.oracle.com
as Sun Alert 1019643.1.

A Security Vulnerability in the Solaris Socket(3SOCKET) Function May Allow Unprivileged Users to Panic the System

CategorySecurity

Release PhaseResolved

Bug Id
6708602

ProductSolaris 10 Operating System
OpenSolaris

Date of Resolved Release13-Nov-2008

Security vulnerability in the Solaris socket(3SOCKET) function:

1. Impact

Due to a security vulnerability in the socket(3SOCKET) function,
Solaris systems without InfiniBand hardware, may allow an unprivileged
local user to panic the system and thereby cause a denial of service
(DoS).

2. Contributing Factors

This issue can occur in the following releases:

SPARC Platform

Solaris 10 with patch 127127-11 and without patch 137137-05

OpenSolaris based upon builds snv_57 through snv_91

x86 Platform

Solaris 10 with patch 127128-11 and without patch 137138-05

OpenSolaris based upon builds snv_57 through snv_91

Note 1: Note: Solaris 8 and
Solaris 9 are not impacted by this issue.Note 2: This issue only occurs
on systems which do NOT have InfiniBand hardware.

To determine if a system has InfiniBand hardware installed, execute the
following command:

# prtconf -D | egrep '(tavor|arbel|hermon)'

If a system has InfiniBand hardware, the output of the above
command will be similar to the following:

pci15b3,5a44, instance #0 (driver name: tavor)

Note 3:OpenSolaris
distributions may include additional bug fixes above and beyond the
build from which it was derived.

To determine the base build of OpenSolaris, the following command
can be used:

$ uname -v snv_86

3. Symptoms

If this issue is exploited to cause a denial of service (DoS), the
kernel panics with a stack trace similar to the following:

The key identifying features of the panic is the "recursive
mutex_enter" message and the presence of
"socksdpv_close()" in the stack trace.

4. Workaround

There is no workaround to this issue. Please see the Resolution section
below.

Note: Backing out the affected
patches to resolve this issue is not advised since these kernel patches
deliver many other security fixes that are required to protect your
system.

5. Resolution

This issue is resolved in the following releases:

SPARC Platform

Solaris 10 with patch 137137-05 or later

OpenSolaris based upon builds snv_92 or later

x86 Platform

Solaris 10 with patch 137138-05 or later

OpenSolaris based upon builds snv_92 or later

For more information
on Security Sun Alerts, see 1009886.1.

This Sun Alert notification is being provided to you on
an "AS IS"
basis. This Sun Alert notification may contain information provided by
third parties. The issues described in this Sun Alert notification may
or may not impact your system(s). Sun makes no representations,
warranties, or guarantees as to the information contained herein. ANY
AND ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR
NON-INFRINGEMENT, ARE HEREBY DISCLAIMED. BY ACCESSING THIS DOCUMENT YOU
ACKNOWLEDGE THAT SUN SHALL IN NO EVENT BE LIABLE FOR ANY DIRECT,
INDIRECT, INCIDENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES THAT ARISE OUT
OF YOUR USE OR FAILURE TO USE THE INFORMATION CONTAINED HEREIN. This
Sun Alert notification contains Sun proprietary and confidential
information. It is being provided to you pursuant to the provisions of
your agreement to purchase services from Sun, or, if you do not have
such an agreement, the Sun.com Terms of Use. This Sun Alert
notification may only be used for the purposes contemplated by these
agreements.
Copyright 2000-2008 Sun Microsystems, Inc., 4150 Network Circle,
Santa
Clara, CA 95054 U.S.A. All rights reserved.